2009 |
67 | EE | Sumit Gulwani,
Saurabh Srivastava,
Ramarathnam Venkatesan:
Constraint-Based Invariant Inference over Predicate Abstraction.
VMCAI 2009: 120-135 |
2008 |
66 | EE | Dimitar Jetchev,
Ramarathnam Venkatesan:
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys.
CRYPTO 2008: 75-92 |
65 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Prasad Naldurg,
Chit Wei Saw,
Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection.
IWSEC 2008: 100-120 |
64 | EE | Matthew Cary,
Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security.
IWSEC 2008: 279-297 |
63 | EE | Sumit Gulwani,
Saurabh Srivastava,
Ramarathnam Venkatesan:
Program analysis as constraint solving.
PLDI 2008: 281-292 |
62 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Non-degeneracy of Pollard Rho Collisions
CoRR abs/0808.0469: (2008) |
2007 |
61 | EE | Nathan Keller,
Stephen D. Miller,
Ilya Mironov,
Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
CT-RSA 2007: 1-19 |
60 | EE | Avinash V. Varadarajan,
Ramarathnam Venkatesan,
C. Pandu Rangan:
Data structures for limited oblivious execution of programs while preserving locality of reference.
Digital Rights Management Workshop 2007: 63-69 |
59 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing.
Digital Rights Management Workshop 2007: 90-94 |
58 | EE | Srivatsan Laxman,
Prasad Naldurg,
Raja Sripada,
Ramarathnam Venkatesan:
Connections between Mining Frequent Itemsets and Learning Generative Models.
ICDM 2007: 571-576 |
57 | EE | David Jao,
Dimitar Jetchev,
Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys.
INDOCRYPT 2007: 33-47 |
56 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
55 | EE | Nenad Dedic,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection.
Information Hiding 2007: 80-95 |
54 | EE | Mariusz H. Jakubowski,
Prasad Naldurg,
Vijay Patankar,
Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Information Hiding 2007: 96-111 |
53 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
MM&Sec 2007: 129-140 |
52 | EE | David Jao,
S. Ramesh Raju,
Ramarathnam Venkatesan:
Digit Set Randomization in Elliptic Curve Cryptography.
SAGA 2007: 105-117 |
51 | EE | Debapratim De,
Abishek Kumarasubramanian,
Ramarathnam Venkatesan:
Inversion Attacks on Secure Hash Functions Using satSolvers.
SAT 2007: 377-382 |
2006 |
50 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions.
ANTS 2006: 573-581 |
49 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
48 | EE | Nathan Keller,
Stephen D. Miller,
Ilya Mironov,
Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers
CoRR abs/cs/0610048: (2006) |
47 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions
CoRR abs/math/0603727: (2006) |
2005 |
46 | | Subhamoy Maitra,
C. E. Veni Madhavan,
Ramarathnam Venkatesan:
Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
Springer 2005 |
45 | EE | Michael Malkin,
Ramarathnam Venkatesan:
Comparison of Texts Streams in the Presence of Mild Adversaries.
ACSW Frontiers 2005: 179-186 |
44 | EE | David Jao,
Stephen D. Miller,
Ramarathnam Venkatesan:
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
ASIACRYPT 2005: 21-40 |
43 | | Mehmet Kucukgoz,
Oztan Harmanci,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 363-369 |
42 | EE | Mustafa Kesal,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking.
Multimedia Syst. 11(2): 133-142 (2005) |
41 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan,
Tie Liu:
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics.
Multimedia Syst. 11(2): 185-200 (2005) |
2004 |
40 | | Suleyman Serdar Kozat,
Ramarathnam Venkatesan,
Mehmet Kivanç Mihçak:
Robust perceptual image hashing via matrix invariants.
ICIP 2004: 3443-3446 |
39 | EE | Tie Liu,
Ramarathnam Venkatesan,
Mehmet Kivanç Mihçak:
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics.
MM&Sec 2004: 124-132 |
38 | EE | Mustafa Kesal,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking.
MM&Sec 2004: 41-45 |
37 | EE | David Jao,
Stephen D. Miller,
Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
CoRR math.NT/0411378: (2004) |
2003 |
36 | EE | Matthew Cary,
Ramarathnam Venkatesan:
A Message Authentication Code Based on Unimodular Matrix Groups.
CRYPTO 2003: 500-512 |
2002 |
35 | EE | Jeremy Horwitz,
Ramarathnam Venkatesan:
Random Cayley Digraphs and the Discrete Logarithm.
ANTS 2002: 416-430 |
34 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan,
Mustafa Kesal:
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.
Information Hiding 2002: 226-246 |
33 | EE | Yuqun Chen,
Ramarathnam Venkatesan,
Matthew Cary,
Ruoming Pang,
Saurabh Sinha,
Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Information Hiding 2002: 400-414 |
32 | EE | Myung M. Bae,
Ramarathnam Venkatesan,
Bella Bose:
Data Rearrangement between Radix-k and Lee Distance Gray Codes in k-ary n-cubes.
J. Parallel Distrib. Comput. 62(1): 19-37 (2002) |
2001 |
31 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
New Iterative Geometric Methods for Robust Perceptual Image Hashing.
Digital Rights Management Workshop 2001: 13-21 |
30 | EE | Ramarathnam Venkatesan,
Vijay V. Vazirani,
Saurabh Sinha:
A Graph Theoretic Approach to Software Watermarking.
Information Hiding 2001: 157-168 |
29 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.
Information Hiding 2001: 51-65 |
28 | EE | Leonid A. Levin,
Ramarathnam Venkatesan:
An Average Case NP-complete Graph Problem
CoRR cs.CC/0112001: (2001) |
2000 |
27 | | Ramarathnam Venkatesan,
Mariusz H. Jakubowski:
Image Watermarking with Better Resilience.
ICIP 2000 |
26 | | Ramarathnam Venkatesan,
S.-M. Koon,
Mariusz H. Jakubowski,
Pierre Moulin:
Robust Image Hashing.
ICIP 2000 |
1999 |
25 | EE | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
High-Speed Pseudorandom Number Generation with Small Memory.
FSE 1999: 290-304 |
1998 |
24 | EE | William Aiello,
Mihir Bellare,
Giovanni Di Crescenzo,
Ramarathnam Venkatesan:
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
CRYPTO 1998: 390-407 |
23 | EE | Victor Boyko,
Marcus Peinado,
Ramarathnam Venkatesan:
Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
EUROCRYPT 1998: 221-235 |
22 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
EUROCRYPT 1998: 281-293 |
21 | EE | Dan Boneh,
Ramarathnam Venkatesan:
Breaking RSA May Not Be Equivalent to Factoring.
EUROCRYPT 1998: 59-71 |
20 | EE | William Aiello,
Stuart Haber,
Ramarathnam Venkatesan:
New Constructions for Secure Hash Functions.
FSE 1998: 150-167 |
19 | EE | William Aiello,
Mihir Bellare,
Giovanni Di Crescenzo,
Ramarathnam Venkatesan:
Security amplification by composition: The case of doubly-iterated ideal ciphers
CoRR cs.CR/9809031: (1998) |
18 | | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators.
J. Algorithms 29(2): 358-389 (1998) |
17 | EE | Moni Naor,
Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation.
J. Cryptology 11(2): 87-108 (1998) |
1997 |
16 | | Marcus Peinado,
Ramarathnam Venkatesan:
Highly Parallel Cryptographic Attacks.
PVM/MPI 1997: 367-374 |
15 | | Dan Boneh,
Ramarathnam Venkatesan:
Rounding in Lattices and its Cryptographic Applications.
SODA 1997: 675-681 |
14 | | Sulaiman Al-Bassam,
Ramarathnam Venkatesan,
Sultan Al-Muhammadi:
New single asymmetric error-correcting codes.
IEEE Transactions on Information Theory 43(5): 1619-1623 (1997) |
1996 |
13 | EE | Dan Boneh,
Ramarathnam Venkatesan:
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
CRYPTO 1996: 129-142 |
12 | EE | William Aiello,
Ramarathnam Venkatesan:
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel.
EUROCRYPT 1996: 307-320 |
1995 |
11 | | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators (Extended Abstract).
SODA 1995: 1-9 |
10 | | Dennis Grinberg,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan,
Victor K. Wei:
Splay Trees for Data Compression.
SODA 1995: 522-530 |
9 | EE | William Aiello,
Mihir Bellare,
Ramarathnam Venkatesan:
Knowledge on the average-perfect, statistical and logarithmic.
STOC 1995: 469-478 |
1994 |
8 | | William Aiello,
Ramarathnam Venkatesan,
Moti Yung:
Coins, Weights and Contention in Balancing Networks.
PODC 1994: 193-205 |
1993 |
7 | EE | Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
EUROCRYPT 1993: 267-273 |
1992 |
6 | EE | Moni Naor,
Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
CRYPTO 1992: 196-214 |
5 | | Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Secure Commitment Against A Powerful Adversary.
STACS 1992: 439-448 |
4 | | Ramarathnam Venkatesan,
Sivaramakrishnan Rajagopalan:
Average Case Intractability of Matrix and Diophantine Problems (Extended Abstract)
STOC 1992: 632-642 |
1991 |
3 | | Sulaiman Al-Bassam,
Bella Bose,
Ramarathnam Venkatesan:
Burst and Unidirectional Error Detecting Codes.
FTCS 1991: 378-384 |
1990 |
2 | | Oded Goldreich,
Russell Impagliazzo,
Leonid A. Levin,
Ramarathnam Venkatesan,
David Zuckerman:
Security Preserving Amplification of Hardness
FOCS 1990: 318-326 |
1988 |
1 | | Ramarathnam Venkatesan,
Leonid A. Levin:
Random Instances of a Graph Coloring Problem Are Hard
STOC 1988: 217-222 |